{"id":1861,"date":"2022-09-12T21:52:00","date_gmt":"2022-09-12T13:52:00","guid":{"rendered":"http:\/\/0.0.0.0:8801\/?p=1861"},"modified":"2022-10-13T16:04:51","modified_gmt":"2022-10-13T08:04:51","slug":"%e7%be%8e%e5%9c%8b%e8%b3%87%e5%ae%89%e4%b8%bb%e7%ae%a1%e6%a9%9f%e9%97%9c%e4%b8%8b%e4%bb%a4%e5%90%84%e5%96%ae%e4%bd%8d%e7%ab%8b%e5%8d%b3%e4%bf%ae%e8%a3%9c%e5%b7%b2%e9%81%ad%e7%94%a8%e6%96%bc%e6%94%bb","status":"publish","type":"post","link":"https:\/\/aict.nkust.edu.tw\/digitrans\/?p=1861","title":{"rendered":"\u7f8e\u570b\u8cc7\u5b89\u4e3b\u7ba1\u6a5f\u95dc\u4e0b\u4ee4\u5404\u55ae\u4f4d\u7acb\u5373\u4fee\u88dc\u5df2\u906d\u7528\u65bc\u653b\u64ca\u4e4b\u6f0f\u6d1e"},"content":{"rendered":"\n<p><strong>\u7f8e\u570b\u8cc7\u5b89\u4e3b\u7ba1\u6a5f\u95dc\u300c\u7db2\u8def\u5b89\u5168\u66a8\u57fa\u790e\u8a2d\u65bd\u5b89\u5168\u5c40\u300d\uff08Cybersecurity and Infrastructure Security Agency, CISA\uff09 \u65e5\u524d\u4e0b\u9054\u547d\u4ee4\uff0c\u8981\u6c42\u806f\u90a6\u653f\u5e9c\u65d7\u4e0b\u5404\u55ae\u4f4d\u5fc5\u9808\u5728\u9650\u671f\u4e4b\u5167\u4fee\u88dc\u65b0\u52a0\u5165\u300c\u5df2\u77e5\u906d\u653b\u64ca\u6f0f\u6d1e\u300d\u6e05\u55ae\uff08Known Exploited Vulnerabilities, KEV\uff09\u7684 12 \u500b\u4ee5\u4e0a\u8cc7\u5b89\u6f0f\u6d1e\uff0c\u5176\u4e2d\u5305\u62ec Google Chrome 0-day \u6f0f\u6d1e\u3002<\/strong><\/p>\n\n\n\n<p>\u9019\u4e9b\u6f0f\u6d1e\u591a\u534a\u5df2\u7d93\u906d\u5230\u5404\u5927\u99ed\u4fb5\u5718\u9ad4\u5927\u898f\u6a21\u7528\u65bc\u653b\u64ca\uff0c\u5176\u4e2d\u5305\u62ec\u5df2\u5728 9 \u6708 2 \u65e5\u63a8\u51fa\u4fee\u88dc\u7248\u672c\u7684 Google Chrome 0-day \u6f0f\u6d1e CVE-2022-3075\u3001\u5df2\u7d93\u767c\u751f\u5927\u898f\u6a21 Deadbolt \u52d2\u8d16\u653b\u64ca\u7684\u7db2\u901a\u7522\u54c1\u6f0f\u6d1e CVE-2022-27593\uff0c\u4ee5\u53ca\u906d\u5230 Mirai \u4ee5\u53ca Moobot \u50f5\u5c4d\u7db2\u8def\u5927\u898f\u6a21\u653b\u64ca\u7684\u5169\u500b\u56b4\u91cd\u6f0f\u6d1e CVE-2022-28958 \u8207 CVE-2022-26258 \u7b49\u3002<\/p>\n\n\n\n<p>\u5176\u4ed6\u65bc\u6b64\u6b21\u5217\u5165\u6e05\u55ae\u4e2d\u7684\u6f0f\u6d1e\uff0c\u9084\u5305\u62ec Apple iOS\u3001iPadOS\u3001macOS \u7684\u8f38\u5165\u9a57\u8b49\u6f0f\u6d1e\uff08CVE-2022-9934\uff09\u3001Oracle WebLogic Server \u7684\u4e0d\u660e\u6f0f\u6d1e\uff08CVE-2018-2628\uff09\u3001Android OS \u6b0a\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CVE-2011-1823\uff09\u7b49\u3002<\/p>\n\n\n\n<p>\u6839\u64da CISA \u6307\u51fa\uff0c\u5728\u8a72\u5c40\u5c07\u6700\u65b0\u6f0f\u6d1e\u52a0\u5165\u5176\u300c\u5df2\u77e5\u906d\u653b\u64ca\u6f0f\u6d1e\u300d\u6e05\u55ae\u5f8c\uff0c\u6240\u6709\u806f\u90a6\u65d7\u4e0b\u7684\u6c11\u4e8b\u76f8\u95dc\u55ae\u4f4d\uff0c\u90fd\u5fc5\u9808\u4f9d\u7167\u65bc\u53bb\uff082021\uff09\u5e74 11 \u6708\u9812\u5e03\u7684\u5f37\u5236\u64cd\u4f5c\u6307\u5f15\uff08Binding Operational Directives, BOD) 22-01 \u4e4b\u898f\u5b9a\uff0c\u9650\u671f\u5b8c\u6210\u65b0\u52a0\u5165\u6f0f\u6d1e\u7684\u4fee\u88dc\u4f5c\u696d\u3002<\/p>\n\n\n\n<p>\u4ee5\u9019\u6b21\u7684\u60c5\u5f62\u800c\u8a00\uff0c\u5404\u806f\u90a6\u6240\u5c6c\u55ae\u4f4d\u5c07\u6709\u4e09\u661f\u671f\u7684\u6642\u9593\u5b8c\u6210\u5404\u9805\u4fee\u88dc\u4f5c\u696d\uff0c\u6700\u9072\u61c9\u65bc 11 \u6708 29 \u65e5\u524d\u5168\u90e8\u5b8c\u6210\u3002<\/p>\n\n\n\n<p>\u96d6\u7136\u7f8e\u570b CISA \u9019\u985e\u547d\u4ee4\u53ea\u5c0d\u7f8e\u570b\u806f\u90a6\u653f\u5e9c\u65d7\u4e0b\u55ae\u4f4d\u5177\u6709\u7d04\u675f\u529b\uff0c\u4f46\u4ecd\u5efa\u8b70\u6211\u570b\u5404\u516c\u79c1\u71df\u55ae\u4f4d\u5bc6\u5207\u6ce8\u610f CISA \u767c\u5e03\u7684\u5404\u9805\u8cc7\u5b89\u901a\u5831\u8207\u4fee\u88dc\u547d\u4ee4\uff0c\u53c3\u8003\u5176\u8cc7\u5b89\u9632\u8b77\u6307\u5f15\u4fee\u88dc\u6f0f\u6d1e\uff0c\u4e26\u5f37\u5316\u81ea\u8eab\u7684\u99ed\u4fb5\u653b\u64ca\u9632\u79a6\u80fd\u529b\u3002<\/p>\n\n\n\n<p>\u767c\u5e03\u55ae\u4f4d:TWCERT\/CC\u66f4\u65b0\u65e5\u671f:2022-09-12<\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a<a href=\"https:\/\/www.twcert.org.tw\/tw\/cp-104-6495-333c5-1.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.twcert.org.tw\/tw\/cp-104-6495-333c5-1.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u7f8e\u570b\u8cc7\u5b89\u4e3b\u7ba1\u6a5f\u95dc\u300c\u7db2\u8def\u5b89\u5168\u66a8\u57fa\u790e\u8a2d\u65bd\u5b89\u5168\u5c40\u300d\uff08Cybersecurity and Infrastructure Security Agency, CISA\uff09 \u65e5\u524d\u4e0b\u9054\u547d\u4ee4\uff0c\u8981\u6c42\u806f\u90a6&hellip;<\/p>\n","protected":false},"author":3,"featured_media":1862,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[352],"tags":[204],"class_list":["post-1861","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-204"],"gutentor_comment":0,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/aict.nkust.edu.tw\/digitrans\/wp-content\/uploads\/2022\/09\/0926-5.jpg?fit=1080%2C1080&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/1861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1861"}],"version-history":[{"count":1,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/1861\/revisions"}],"predecessor-version":[{"id":1863,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/1861\/revisions\/1863"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/media\/1862"}],"wp:attachment":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}